[128072] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Kaminsky finds DNS exploit

daemon@ATHENA.MIT.EDU (Florian Weimer)
Mon Jul 14 09:22:45 2008

From: Florian Weimer <fw@deneb.enyo.de>
To: cryptography@metzdowd.com
Date: Sun, 13 Jul 2008 20:50:37 +0200
In-Reply-To: <20080709172232.GA14326@randombit.net> (Jack Lloyd's message of
	"Wed, 9 Jul 2008 13:22:32 -0400")

* Jack Lloyd:

> Perhaps there is something subtle here that is more dangerous than the
> well known problems, and all these source port randomization and
> transaction id randomization fixes are just a smokescreen of sorts for
> a fix for something Dan found.

It's not a smokescreen, it's a statistical workaround.

CERT/CC mentions this:

| It is important to note that without changes to the DNS protocol, such
| as those that the DNS Security Extensions (DNSSEC) introduce, these
| mitigations cannot completely prevent cache poisoning.

<http://www.kb.cert.org/vuls/id/800113>

> A statement from the MaraDNS author [3]:
>
> """
> MaraDNS is immune to the new cache poisoning attack.

I think the CERT/CC statement is more approriate.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post